Mobile applications

Smartphone or tablet applications are very convenient. They look similar to web applications, but are not quite or sometimes not all identical. Their compatibility with mobile devices provides extra functionality, but also extra threats.

A smartphone or tablet is easily lost or stolen. When that happens, what kind of unencrypted data remains on the device that should not be?